Filters
Question type

Study Flashcards

The Trojan-horse virus hides inside other software, usually as an attachment or a downloadable file.

Correct Answer

verifed

verified

Trojan-horse virus hides inside other ________, usually as an attachment or a downloadable file.

Correct Answer

verifed

verified

What is the most costly and intrusive form of authentication?


A) Something the user knows such as a user ID and password
B) Something the user has such as a smart card or token
C) Something that is part of the user such as a fingerprint or voice signature
D) None of the above

Correct Answer

verifed

verified

Describe the relationship between information security policies and an information security plan.

Correct Answer

verifed

verified

The information security plan details ho...

View Answer

Which of the following is not one of the five steps for creating an information security plan?


A) Develop the information security policies
B) Communicate the information security policies
C) Revise and test the information security policies
D) Test and reevaluate risks

Correct Answer

verifed

verified

_________ hat hackers work at the request of the system owners to find system vulnerabilities and plug the holes.

Correct Answer

verifed

verified

What is the recommended way to implement information security lines of defense?


A) People first, technology second
B) Technology first, people second
C) None of the above
D) All of the above

Correct Answer

verifed

verified

Which of the following is not one of the top 10 questions managers should ask regarding information security?


A) Is there clear accountability for information security in our organization?
B) How much is spent on information security and what is it being spent on?
C) What is the impact on the organization of a serious security incident?
D) How do we identify potential insiders?

Correct Answer

verifed

verified

_________ filtering occurs when an organization uses software that filters content to prevent the transmission of unauthorized information.

Correct Answer

verifed

verified

Spoofing is the forging of the _________ address on an email so teat the email message appears to come from someone other than the actual sender.

Correct Answer

verifed

verified

_________ are people very knowledgeable about computers who use their knowledge to invade other people's computers.

Correct Answer

verifed

verified

Which of the following is not one of the three primary information security areas?


A) Authentication and authorization
B) Prevention and resistance
C) Detection and resistance
D) None of the above

Correct Answer

verifed

verified

___________ attack computer systems by transmitting a virus hoax, with a real virus attached.

Correct Answer

verifed

verified

What identifies the rules required to maintain information security?


A) Information security plan
B) Information security policies
C) Authentication
D) Biometrics

Correct Answer

verifed

verified

What floods a website with so many requests for service that it slows down or crashes the site?


A) Computer virus
B) Worm
C) Denial-of-service attack
D) None of the above

Correct Answer

verifed

verified

_______________ kiddies find hacking code on the Internet and click-and-point their way into systems to cause damage or spread viruses.

Correct Answer

verifed

verified

____________ is the identification of a user based on a physical characteristic.

Correct Answer

verifed

verified

Which of the following does a firewall perform?


A) Examines each message that wants entrance to the network
B) Blocks messages without the correct markings from entering the network
C) Detects computers communicating with the Internet without approval
D) All of the above

Correct Answer

verifed

verified

What is the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting?


A) Smart card
B) Token
C) Biometrics
D) Content filtering

Correct Answer

verifed

verified

Which is a virus that opens a way into the network for future attacks?


A) Distributed denial-of-service attack
B) Worm
C) Denial-of-service attack
D) Backdoor programs

Correct Answer

verifed

verified

Showing 61 - 80 of 80

Related Exams

Show Answer